Information Security Leader, Author, Instructor and Speaker

Default utility Image

IDC PlanScape: Threat Hunting TAGS: | | “Threat hunting is the latest trend in cybersecurity analytics,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). …Continue reading →

Default utility Image

Data Science in Cybersecurity: Five Questions to Ask Vendors TAGS: “There’s a mad rush in the cybersecurity solutions space to use the terms machine learning, analytics, and data science in …Continue reading →

Default utility Image

Addressing the Cybersecurity Skills Gap TAGS: Cybersecurity professionals are used to managing crises,¬†from the latest ransomware attack streaking across the Internet to a critical security vulnerability …Continue reading →

Default utility Image

IDC PlanScape: Creating a Cybersecurity Professional Development Program TAGS: | | “The world of cybersecurity is becoming increasingly siloed,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Leaders …Continue reading →

Default utility Image

IDC PlanScape: Building a Security Operations Center TAGS: | | “The security operations center serves as the nerve center of an organization’s cybersecurity program,” says Mike Chapple, adjunct analyst with …Continue reading →

Default utility Image

IDC PlanScape: Building Compliant Cloud Environments TAGS: | “Compliance has come to the cloud,” says Mike Chapple, adjunct analyst with IDC’s IT Executive Programs (IEP). “Enterprises planning a …Continue reading →

Default utility Image

3 Tips for a Smooth Data Loss Prevention Rollout TAGS: | Edward Snowden and Reality Winner grabbed headlines for leaking sensitive information from agencies, but they?re only the most visible examples …Continue reading →

Default utility Image

DHS’s CDM Program Moves to the Next Phase: Protection TAGS: From Russian and Chinese hackers to WikiLeaks and North Korea, nefarious actors have long targeted federal systems, looking to steal …Continue reading →

Default utility Image

IDC PlanScape: Deploying Multifactor Authentication TAGS: “Multifactor authentication is a time-tested approach that is finally coming of age,” says Mike Chapple, adjunct analyst with IDC’s IT …Continue reading →

Default utility Image

HIPAA Controls Don’t Do Enough for Privacy and Security TAGS: | The authors of the HIPAA wrote a law designed to protect the security and privacy of health information in many¬†different …Continue reading →

Mike Chapple, CISSP, Ph.D.

Mike is an IT leader, information security professional, author, speaker and trainer with over fifteen years of experience in the field.

Full Biography

@mchapple